Analysis
-
max time kernel
136s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 13:40
Static task
static1
Behavioral task
behavioral1
Sample
e04c837c44e16edf8321169219013d58_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e04c837c44e16edf8321169219013d58_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e04c837c44e16edf8321169219013d58_JaffaCakes118.exe
-
Size
638KB
-
MD5
e04c837c44e16edf8321169219013d58
-
SHA1
a944ef3f7a29b9f9044fa635786844401e44819c
-
SHA256
dce7a93728c68a149a9a00c225b5aa911b75cfdf7d78356cdb6e4c974e1f73ae
-
SHA512
c62a9938255ae9ca04803dc93c23e87b52a0a1ad384bdf5bd33a06d035b981746556b0d4d92e35e62e252ed3bc8ec991703578e605565438d4750f8638afce49
-
SSDEEP
12288:VLBDU75lzrFmQaHK5V9Ay9Y/IC3EESFDZglrV1c2obY7j9/2+C//:VdDU7TzrFmf2VOy9YwC3EEdlNocl/2+U
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
resource yara_rule behavioral2/files/0x0009000000023619-63.dat modiloader_stage2 behavioral2/memory/2240-72-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral2/memory/4692-74-0x0000000000B80000-0x0000000000C40000-memory.dmp modiloader_stage2 behavioral2/memory/1236-76-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 behavioral2/memory/2060-75-0x0000000000400000-0x00000000004C0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 1236 RE_SER~1.EXE 2060 rejoice46.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e04c837c44e16edf8321169219013d58_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe File opened for modification C:\Windows\SysWOW64\_rejoice46.exe rejoice46.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2060 set thread context of 2240 2060 rejoice46.exe 95 PID 2060 set thread context of 4692 2060 rejoice46.exe 96 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe RE_SER~1.EXE File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe RE_SER~1.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 1212 2240 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e04c837c44e16edf8321169219013d58_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RE_SER~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rejoice46.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3380492277" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31131307" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433086231" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3380492277" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31131307" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3381273152" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31131307" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F3A7E2D3-729E-11EF-A2A4-D60584CC4361} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31131307" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3381273152" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4692 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4692 IEXPLORE.EXE 4692 IEXPLORE.EXE 4156 IEXPLORE.EXE 4156 IEXPLORE.EXE 4156 IEXPLORE.EXE 4156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1236 4928 e04c837c44e16edf8321169219013d58_JaffaCakes118.exe 90 PID 4928 wrote to memory of 1236 4928 e04c837c44e16edf8321169219013d58_JaffaCakes118.exe 90 PID 4928 wrote to memory of 1236 4928 e04c837c44e16edf8321169219013d58_JaffaCakes118.exe 90 PID 1236 wrote to memory of 2060 1236 RE_SER~1.EXE 94 PID 1236 wrote to memory of 2060 1236 RE_SER~1.EXE 94 PID 1236 wrote to memory of 2060 1236 RE_SER~1.EXE 94 PID 2060 wrote to memory of 2240 2060 rejoice46.exe 95 PID 2060 wrote to memory of 2240 2060 rejoice46.exe 95 PID 2060 wrote to memory of 2240 2060 rejoice46.exe 95 PID 2060 wrote to memory of 2240 2060 rejoice46.exe 95 PID 2060 wrote to memory of 2240 2060 rejoice46.exe 95 PID 2060 wrote to memory of 4692 2060 rejoice46.exe 96 PID 2060 wrote to memory of 4692 2060 rejoice46.exe 96 PID 2060 wrote to memory of 4692 2060 rejoice46.exe 96 PID 4692 wrote to memory of 4156 4692 IEXPLORE.EXE 101 PID 4692 wrote to memory of 4156 4692 IEXPLORE.EXE 101 PID 4692 wrote to memory of 4156 4692 IEXPLORE.EXE 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e04c837c44e16edf8321169219013d58_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e04c837c44e16edf8321169219013d58_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RE_SER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RE_SER~1.EXE2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"C:\Program Files\Common Files\Microsoft Shared\MSINFO\rejoice46.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\system32\calc.exe"4⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 125⤵
- Program crash
PID:1212
-
-
-
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4692 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4156
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2240 -ip 22401⤵PID:3204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4216,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=4012 /prefetch:81⤵PID:3804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5b846b882719e09ee4996593fe9ce2fdb
SHA168f64b77cab775e1b90b563325c0bf42c60e30bf
SHA256bec22a671cf77d0beb4395abc6ceb14a9c02822997bce4b9f4b79ef54effaeb7
SHA512b1eec5f0ad9ff3142ef1c66ce9f615d9a5ff3dfef05693fe860defebd231b706a7c4fc05f591760762b600b1a386ac6474713c94f37e57667a20873267f20190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD522c598785537e5d616e2149bdf8c226e
SHA18a1bb00da8308c13971dcd3c93520b7a8cb4c4a9
SHA256103102420ca9502d873eda2f39ef2751becabdb5013bf65f3d938d9322dc145a
SHA512e8b4d01cfbe7725740fc236a6dd66e7ef842467be7e82efaedfb45f696a760b88e37ca246e5835dc67f4c613c687294b9b6dbc9ed481b7b13a998de1b0145ec9
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
737KB
MD52fe994c801b62364ac142addfba1b9b0
SHA1eecf8978dcfb56d927be8597215c6a3307706273
SHA2562d67ca21a17800568b58fcccee163266ac2f749c14bf2a61005a151a4197060e
SHA5128d74f90841e870116688c078744febab9c80316fbfb3d0aae76628f9d64ab8ced1b6979187101445607dce2cee92295c0518b9e75e29c8497c4a749eb6902cec